Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Cryptocurrency: Platforms

Search All Applications in Cryptocurrency: Platforms


Application US20200044863


Published 2020-02-06

Techniques For Securing Digital Signatures Using Multi-party Computation

Techniques for securing digital signatures using multi-party computation. A method includes generating at least one first secret share by a first system, wherein at least one second secret share is generated by one of at least one second system; signing data based on the at least one first secret share when a signing policy is met, wherein the signing is part of an interactive signing process including running a multi-party computation protocol by the first system and the at least one second system, wherein the signed data corresponds to a public key generated based on the plurality of secret shares, wherein the signing policy requires a minimum number of secret shares, wherein shares of one system alone are not sufficient to meet the signing policy, wherein no portion of shares of one system are revealed to the other system during the interactive signing process.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A method for securing digital signatures using multi-party computation, comprising: generating at least one first secret share of a plurality of secret shares by a first system, wherein the plurality of secret shares includes the at least one first secret share and at least one second secret share, wherein each of the at least one second secret share is generated by one of at least one second system, wherein the at least one second system is not the first system; signing data based on the at least one first secret share when a signing policy is met, wherein the signing occurs as part of an interactive signing process, wherein the interactive signing process includes running a multi-party computation protocol by the first system and the at least one second system, wherein each system uses each secret share generated by the system during the interactive signing process, wherein the signed data corresponds to a public key, wherein the public key is generated based on the plurality of secret shares, wherein the signing policy at least requires a minimum number of secret shares of the plurality of secret shares, wherein neither the at least one first secret share alone nor the at least one second secret share alone is sufficient to meet the signing policy, wherein no portion of the at least one first secret share is revealed to the at least one second system during the interactive signing process, wherein no portion of the at least one second secret share is revealed to the first system during the interactive signing process.

  • 15. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to execute a process, the process comprising: generating at least one first secret share of a plurality of secret shares by a first system, wherein the plurality of secret shares includes the at least one first secret share and at least one second secret share, wherein each of the at least one second secret share is generated by one of at least one second system, wherein the at least one second system is not the first system; signing data based on the at least one first secret share when a signing policy is met, wherein the signing occurs as part of an interactive signing process, wherein the interactive signing process includes running a multi-party computation protocol by the first system and the at least one second system, wherein each system uses each secret share generated by the system during the interactive signing process, wherein the signed data corresponds to a public key, wherein the public key is generated based on the plurality of secret shares, wherein the signing policy at least requires a minimum number of secret shares of the plurality of secret shares, wherein neither the at least one first secret share alone nor the at least one second secret share alone is sufficient to meet the signing policy, wherein no portion of the at least one first secret share is revealed to the at least one second system during the interactive signing process, wherein no portion of the at least one second secret share is revealed to the first system during the interactive signing process.

  • 16. A system for securing digital signatures using multi-party computation, comprising: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: generate at least one first secret share of a plurality of secret shares, wherein the system is a first system, wherein the plurality of secret shares includes the at least one first secret share and at least one second secret share, wherein each of the at least one second secret share is generated by one of at least one second system, wherein the at least one second system is not the first system; signing data based on the at least one first secret share when a signing policy is met, wherein the signing occurs as part of an interactive signing process, wherein the interactive signing process includes running a multi-party computation protocol by the first system and the at least one second system, wherein each system uses each secret share generated by the system during the interactive signing process, wherein the signed data corresponds to a public key, wherein the public key is generated based on the plurality of secret shares, wherein the signing policy at least requires a minimum number of secret shares of the plurality of secret shares, wherein neither the at least one first secret share alone nor the at least one second secret share alone is sufficient to meet the signing policy, wherein no portion of the at least one first secret share is revealed to the at least one second system during the interactive signing process, wherein no portion of the at least one second secret share is revealed to the first system during the interactive signing process.